16:00:22 #startmeeting keystone 16:00:27 Meeting started Tue Mar 12 16:00:22 2019 UTC and is due to finish in 60 minutes. The chair is cmurphy. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:28 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:31 The meeting name has been set to 'keystone' 16:00:41 o/ 16:00:42 o/ 16:00:57 lbragstad has a conflicting meeting 16:01:06 #link https://etherpad.openstack.org/p/keystone-weekly-meeting agenda 16:01:20 feel free to add things to the agenda 16:01:20 o/ 16:01:26 * lbragstad lingers in the back 16:01:31 o/ 16:02:48 o/ 16:03:00 o/ 16:03:05 #topic announcements 16:03:14 #info RC1 target week next week 16:03:21 #link https://releases.openstack.org/stein/schedule.html release schedule 16:03:23 How'r we looking? 16:03:30 pretty good i think 16:03:43 i started going through bugs and marking them for rc1 16:04:30 cmurphy are there any major ones on your radar after doing that? 16:05:05 #link https://launchpad.net/keystone/+milestone/stein-rc1 Stein-RC1 bugs 16:05:43 nice - i'm happy to see 1819036 made the target 16:05:53 lbragstad: I targed some of the rbac ones for rc1, especially the ones marked high priority or already in progress 16:06:05 mmmmmmm 16:06:10 cooooofffffffffffffeeeee time. 16:06:17 also... grump at time change. 16:06:17 yeah that one was one i noticed too while working on the access rules token validation 16:06:38 also #1817313 may be one kmalloc could have a look at 16:06:44 validating tokens twice you mean? 16:06:48 lbragstad: right 16:07:00 Wouldn't app creds be more important than some of the others/ 16:07:01 is that a LP bug? 16:07:01 ? 16:07:16 ah yeah it is. 16:07:17 i remember dolph and i noticed that when we benchmarked keystone in public cloud in 2015, but we never dug into it 16:07:53 hmm if it's been like that since 2015 then maybe not a good target for stein 16:08:06 or not a top priority anyway 16:08:14 it's been around for a while for sure 16:08:20 true 16:08:20 the double validation is from when we converted over to KSM 16:08:23 the fix *seems* trivial? 16:08:29 it's really not a huge priority 16:08:36 especially with caching. 16:08:42 but we can totally land it for stien 16:08:48 it is not a big deal either way 16:09:05 i think tim recording a 23% performance improvement 16:09:09 with caching configured 16:09:14 recorded* 16:09:16 with caching properly configured? 16:09:20 yeah 16:09:22 that seems high. 16:09:30 he has some pretty extensive performance numbers 16:09:49 they're trying to get keystone as fast as possible, including benchmarks under pypy 16:09:50 if he was using py-spy i found py-spy abnormally increases performance "increase" numbers when used. 16:10:04 because of the heavy intropection. 16:10:11 feel free to change the target on any of these if you don't think it's appropriate for rc1, and help with triaging the rest of the bug list is welcome 16:10:21 if it was another benchmark it's probably closer to real 16:10:29 fwiw - i noticed a similar performance improvement but i based it on raw timing 16:10:54 ( i didn't use repoze, py-spy, or anything like that) 16:11:01 there is crypto activity 16:11:11 so, sure, like i said, we can totally land it 16:11:28 my view is it is fairly trivial change if we pass all testing 16:12:13 ack - i need to test it, but i was going to attempt that with a mock (shrug) 16:12:22 re bug 1817313 - this looks like lack of testing bit us. 16:12:23 bug 1817313 in OpenStack Identity (keystone) "RBAC Enforcer Programming Error raised for malformed federation protocol request" [High,Triaged] https://launchpad.net/bugs/1817313 16:12:45 or well lack of voting testing. 16:12:48 at least 16:13:16 and that should be a 400 probably not a 404. 16:13:53 Malformed request 16:14:04 yeah, it's a bad request afaict 16:14:18 Agreed 16:14:35 also, using paste as a link in the LP bug is a bad idea, paste may purge the data 16:14:42 /opt/stack/keystone/keystone/server/flask/common.py", line 153, in _assert_rbac_enforcement_called 16:14:44 we should ensure to capture the paste data as an attachment. 16:14:50 on it 16:14:54 i'll cover that 16:15:01 ayoung: ^ working on it already 16:15:15 I'll remember that for next time 16:15:28 I just don't like putting logs in the bug description 16:15:43 cmurphy: totally 16:15:46 yeah, but next comment is ok, right? 16:15:57 cmurphy: i wouldn't put it in the description either :) 16:16:02 ayoung: yep. 16:16:26 anything else on bugs or questions about the RC? 16:16:59 that one should be pretty easy to fix fwiw. 16:17:44 it's just routing some data to the handler in a way that the name is missing from the put 16:18:05 it is probably a mis-matched routing rule actually. 16:18:31 It looks like a Flaskism 16:20:10 #topic Technical Vision/Mission Statement draft 16:20:19 #link https://review.openstack.org/641374 technical vision draft 16:20:28 the commit message explains what this is about 16:20:59 right now it's mostly a mirror of the TC's technical vision document, but i think we should feel free to change it into whatever format makes sense for the keystone team 16:21:18 would like some eyes from the team before I ask the TC for feedback 16:21:19 yep, https://github.com/openstack/keystone/blob/master/keystone/api/os_federation.py#L161 that needs to probably be split out into it's own resource 16:21:30 i'll add it to the bug 16:21:39 thanks kmalloc 16:23:12 any questions about the vision document? we can discuss on the review, mostly just wanted to make it known that it was in progress 16:23:48 vision doc looked good at the first pass 16:23:55 i need to do a deeper read 16:23:58 i agree 16:24:06 about it looking good 16:24:23 i've parsed it a couple times and i don't have anything constructive to add 16:24:25 but i didn't see anything that was "OMG wrong" that i would hold up the merge on 16:24:36 sweet 16:24:43 deeper reading will be appreciated 16:25:24 Yes it is a good read. Thanks cmurphy for it. 16:25:56 :) 16:26:03 #topic RBAC work 16:26:09 #link http://lists.openstack.org/pipermail/openstack-discuss/2019-March/003552.html 16:26:15 lbragstad: floor is yours 16:26:23 ok - this will be quick 16:26:30 but last week we talked about this in the meeting 16:26:59 but we didn't really have an exact bead on where things were with all the bugs/work we have in flight for scope types and reader role work 16:27:09 that email is an attempt at sharing that 16:27:40 i think it's safe to assume that we're not going to get all scope types and default role work done in stein :( 16:28:05 so - i'm curious if people want to weigh in on what we should prioritize, if anything, for the next two weeks for reader role and scope types work 16:29:46 looking at https://bugs.launchpad.net/keystone/+bugs?field.tag=system-scope it's interesting that they're all marked high priority except for two? 16:30:01 yeah... that could probably be adjusted 16:30:12 I have started on grant API, and role_assignment is in mid-way due to some tempest test cases failing 16:30:29 i was probably a little over zealous in marking priority for those 16:31:25 lbragstad: you came to an agreement with gmann that will let us move forward on some of them? (was it domain reader?) 16:31:39 yeah - i can fill people in there 16:31:41 * lbragstad grabs a link 16:32:23 we were having a whole bunch of issues with tempest and domain reader functionality for projects 16:32:25 #link https://review.openstack.org/#/c/624218/8 16:32:38 ^ that patch is where we start incorporating domain default roles 16:32:58 the problem is due to a tempest setting that assumes people with domain role assignments are actually system/cloud administrators 16:33:44 the tempest test was creating projects in a domain that the domain admin didn't have authorization on, but the test asserts that user can list all projects in that domain, even though they don't have any authorization there 16:34:10 which, i assume we can agree that isn't what we want 16:34:42 so gmann put up a patch to tempest that corrects the test cases to use the proper domain, instead of creating a new domain https://review.openstack.org/#/c/642102/ 16:35:05 so it updates things to work with domain-scope, the way we (in keystone) expect domain scope to work 16:35:17 ^ that fix is specific to project resource tests in tempest 16:35:41 but we will likely have to take a very similar approach to get https://review.openstack.org/#/c/623319/7 passing 16:38:19 sounds good 16:38:53 personally I'll prioritize reviewing and merging the things that are already in progress, i think that's easily achievable 16:39:12 ++ 16:39:16 i agree 16:39:27 i think it would be amazing if we could get projects and users done 16:39:44 i think it's also not unreasonable to get these four that aren't started yet done https://bugs.launchpad.net/keystone/+bugs?field.tag=system-scope 16:40:07 but https://bugs.launchpad.net/keystone/+bugs?field.tag=default-roles may be a bit more work than we can manage 16:40:26 thanks lbragstad cmurphy 16:40:36 the default roles work impacts every api, where as scope work is specific to a few areas 16:41:01 so - i'm happy to punt limits scope work until Train 16:41:16 people aren't using it yet, and it would be nice to get oslo.policy support for that weird edge case we hit 16:41:33 but i'll defer to whatever the team wants to do 16:41:39 wfm 16:43:08 #agreed prioritize reviewing and merging in-progress system scope and reader role work 16:43:18 #agreed punt limits scope work till Train 16:43:49 anything else on this topic? 16:43:51 if anyone has questions or wants to divvy up work, let me know 16:44:03 * lbragstad is done 16:45:05 #topic reviews 16:45:22 any other reviews people want eyes on? 16:46:16 #link https://review.openstack.org/#/c/638563/ scope documentation for devs 16:46:20 from lbragstad ^ 16:48:19 I don't have anything to call out 16:48:51 people could throw suggestions for testing on https://review.openstack.org/#/c/641499/ if they want 16:49:28 #link https://review.openstack.org/#/c/641499/ validating tokens only once 16:50:58 #topic open discussion 16:51:04 floor is open 16:52:04 when do we want to start formalizing the PTG schedule? 16:52:49 #link https://etherpad.openstack.org/p/DEN-keystone-forum-sessions forum/ptg topic brainstorm 16:53:15 probably in the next couple of weeks i guess 16:53:15 i need to book a flight... or plan to drive out to the PTG. 16:53:32 i still need to do that too 16:53:41 i'm booking the marathon week special 16:53:52 i get in on the 27th and leaving the following saturday 16:54:03 i am going to be toast by the end 16:54:20 depending on when the talk we're giving is... 16:54:25 i might skip the first part of the summit. 16:54:43 * cmurphy will be breaking new barriers in caffeine consumption 16:54:56 lol 16:55:02 cmurphy: should we all chip in to pre-ship a couple extra flats of the monster for you? 16:55:16 ;) 16:55:34 lol 16:55:49 btw please keep adding to the ptg topic brainstorm if there are things you want to talk about 16:56:24 also - cross-project sessions might be tough to schedule 16:56:34 just because we have less time 16:56:35 yeah 16:57:29 * lbragstad thinks divide and conquer is going to be the name of the game this time 16:57:38 FWIW, I'm really not looking forward to the week-long thing 16:57:53 lbragstad: how many cross-project topics do you have in mind that aren't already forum sessions? 16:58:03 well - that's a good question 16:58:12 some seems like they could use both? 16:58:43 i mean, traditionally, we have forum sessions to tailor the content towards the user community and operators 16:58:49 i sorta feel like with the condensed time we're gonna have to limit cross-project things to forum sessions 16:59:06 1 minute warning 16:59:27 the PTG are so developer specific, i fear consolidating both groups into a forum session is going to overrun content 16:59:43 fair 16:59:45 (e.g., we'll focus on design things, or we'll focus on operator communication) 17:00:03 definitely the time with the qa team will be worth having as a ptg session rather than forum session 17:00:08 anyways 17:00:08 ++ 17:00:11 #endmeeting